Whilst much has been written about Log4j and the potential impact to the applications that rely on the now infamous java library, little has been said about how attackers could leverage the flaw to gain control of your domain at the highest levels of privilege. For the purpose of this article, we will assume that you are familiar with Active Directory and that you understand its strategic position for information systems. We will discuss five major situations in which Log4Shell allow attackers to achieve complete domain domination over your Active Directory infrastructure. These five situations are not exhaustive and, beyond any doubt, there are many other compromise paths using similar concepts.

Leave a Reply